samba-3.5.8 for ARM
[tomato.git] / release / src-rt-6.x.4708 / router / samba-3.5.8 / source4 / lib / registry / tools / regtree.c
blob948ed49312d4eecfef143f23759c7e0a483ecd7e
1 /*
2 Unix SMB/CIFS implementation.
3 simple registry frontend
5 Copyright (C) Jelmer Vernooij 2004-2007
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "includes.h"
22 #include "lib/registry/registry.h"
23 #include "lib/registry/tools/common.h"
24 #include "lib/events/events.h"
25 #include "lib/cmdline/popt_common.h"
26 #include "param/param.h"
28 /**
29 * Print a registry key recursively
31 * @param level Level at which to print
32 * @param p Key to print
33 * @param fullpath Whether the full pat hshould be printed or just the last bit
34 * @param novals Whether values should not be printed
36 static void print_tree(int level, struct registry_key *p,
37 const char *name,
38 bool fullpath, bool novals)
40 struct registry_key *subkey;
41 const char *valuename, *keyname;
42 uint32_t valuetype;
43 DATA_BLOB valuedata;
44 struct security_descriptor *sec_desc;
45 WERROR error;
46 int i;
47 TALLOC_CTX *mem_ctx;
49 for(i = 0; i < level; i++) putchar(' '); puts(name);
51 mem_ctx = talloc_init("print_tree");
52 for (i = 0; W_ERROR_IS_OK(error = reg_key_get_subkey_by_index(mem_ctx,
55 &keyname,
56 NULL,
57 NULL)); i++) {
59 SMB_ASSERT(strlen(keyname) > 0);
60 if (!W_ERROR_IS_OK(reg_open_key(mem_ctx, p, keyname, &subkey)))
61 continue;
63 print_tree(level+1, subkey, (fullpath && strlen(name))?
64 talloc_asprintf(mem_ctx, "%s\\%s",
65 name, keyname):
66 keyname, fullpath, novals);
67 talloc_free(subkey);
69 talloc_free(mem_ctx);
71 if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
72 DEBUG(0, ("Error occured while fetching subkeys for '%s': %s\n",
73 name, win_errstr(error)));
76 if (!novals) {
77 mem_ctx = talloc_init("print_tree");
78 for(i = 0; W_ERROR_IS_OK(error = reg_key_get_value_by_index(
79 mem_ctx, p, i, &valuename, &valuetype, &valuedata));
80 i++) {
81 int j;
82 for(j = 0; j < level+1; j++) putchar(' ');
83 printf("%s\n", reg_val_description(mem_ctx,
84 lp_iconv_convenience(cmdline_lp_ctx), valuename,
85 valuetype, valuedata));
87 talloc_free(mem_ctx);
89 if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
90 DEBUG(0, ("Error occured while fetching values for '%s': %s\n",
91 name, win_errstr(error)));
95 mem_ctx = talloc_init("sec_desc");
96 if (NT_STATUS_IS_ERR(reg_get_sec_desc(mem_ctx, p, &sec_desc))) {
97 DEBUG(0, ("Error getting security descriptor\n"));
99 talloc_free(mem_ctx);
102 int main(int argc, char **argv)
104 int opt, i;
105 const char *file = NULL;
106 const char *remote = NULL;
107 poptContext pc;
108 struct registry_context *h = NULL;
109 struct registry_key *start_key = NULL;
110 struct tevent_context *ev_ctx;
111 WERROR error;
112 bool fullpath = false, no_values = false;
113 struct poptOption long_options[] = {
114 POPT_AUTOHELP
115 {"file", 'F', POPT_ARG_STRING, &file, 0, "file path", NULL },
116 {"remote", 'R', POPT_ARG_STRING, &remote, 0, "connect to specified remote server", NULL },
117 {"fullpath", 'f', POPT_ARG_NONE, &fullpath, 0, "show full paths", NULL},
118 {"no-values", 'V', POPT_ARG_NONE, &no_values, 0, "don't show values", NULL},
119 POPT_COMMON_SAMBA
120 POPT_COMMON_CREDENTIALS
121 POPT_COMMON_VERSION
122 { NULL }
125 pc = poptGetContext(argv[0], argc, (const char **) argv, long_options,0);
127 while((opt = poptGetNextOpt(pc)) != -1) {
130 ev_ctx = s4_event_context_init(NULL);
132 if (remote != NULL) {
133 h = reg_common_open_remote(remote, ev_ctx, cmdline_lp_ctx, cmdline_credentials);
134 } else if (file != NULL) {
135 start_key = reg_common_open_file(file, ev_ctx, cmdline_lp_ctx, cmdline_credentials);
136 } else {
137 h = reg_common_open_local(cmdline_credentials, ev_ctx, cmdline_lp_ctx);
140 if (h == NULL && start_key == NULL)
141 return 1;
143 poptFreeContext(pc);
145 error = WERR_OK;
147 if (start_key != NULL) {
148 print_tree(0, start_key, "", fullpath, no_values);
149 } else {
150 for(i = 0; reg_predefined_keys[i].handle; i++) {
151 error = reg_get_predefined_key(h,
152 reg_predefined_keys[i].handle,
153 &start_key);
154 if (!W_ERROR_IS_OK(error)) {
155 fprintf(stderr, "Skipping %s: %s\n",
156 reg_predefined_keys[i].name,
157 win_errstr(error));
158 continue;
160 SMB_ASSERT(start_key != NULL);
161 print_tree(0, start_key, reg_predefined_keys[i].name,
162 fullpath, no_values);
166 return 0;